On Wed, 16 Feb 2011 22:05 -0800, "Curtis Ward" <[email protected]> wrote: > I beg you for one now.
You seem to be confused about security. Your stated needs for confidentiality conflict with your desire for an out-of-the-box solution. Do you realize that any phone manufacturer / mobile carrier can sell phones that can be remotely controlled? This risk exists even more for iOS than Android, since neither the operating system nor device specification are open for scrutiny. Even with a GPG-aware mail client someone could well monitor your key presses or screen remotely. In short, don't use your mobile phone directly for secure communication. The best you can get is tethering, ie connect your computer to a network using the mobile phone as a network interface. Then you can tunnel secure channels on top of this using your (presumably secure) computer. -- Raphael 'kena' Poss _______________________________________________ gpgtools-users mailing list [email protected] FAQ: http://www.gpgtools.org/faq.html Changes: http://lists.gpgtools.org/mailman/listinfo/gpgtools-users Unsubscribe: http://lists.gpgtools.org/mailman/options/gpgtools-users/[email protected]?unsub=Unsubscribe&unsubconfirm=1 This email sent to: [email protected]
